Apple's release this week of a patch fixing a record 83 vulnerabilities, nearly 90 percent critical, is proof the company's products are not impenetrable.
The fixes mostly involve the open-source WebKit browser engine at the heart of Safari and Google Chrome. The engine also drives browsers on iOS and Android.
Safari 5.1.4 repaired 72 critical glitches that exposed the browser to multiple attack options, including cross-site scripting, disclosure of cookies and arbitrary code execution. "There are a couple of takeaways from this, the first being that Apple products are 'hacker proof' is a myth," Marcus Carey, security researcher at Rapid7, said.
The second takeaway is the need to manage the use of Apple laptops, tablets and smartphones when connected to a corporate network.
"Even just allowing employees to install iTunes on their machines exposes the organisation to Safari/WebKit vulnerabilities," Carey said.
Most experts agree that Apple's Safari and Mac OS X is not any more secure than new versions of Microsoft Internet Explorer and Windows. The latter remains the number one target of hackers because of its much larger installed base and because cyber-criminals have more tools and code available to update malware for new attacks.
The Safari update followed by about a week a patch for 81 security flaws found in iOS, the operating system for the iPhone and iPad. In the Safari fix, Apple benefited from Google's Pwn2Own hacking contest, where several of the latest glitches were discovered this month.
This article originally appeared at crn.com
Copyright © 2014 The Channel Company, LLC. All rights reserved.
Issue: 335 | January/February 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.